Working Paper 71 / 2022
Working Paper 71 / 2022
Over the past few years, government efforts to regulate tech giants around the world have marked global long-term trends. The authors of this working paper take a closer look at recent key changes in Big Tech regulation both at the international level and in individual jurisdictions of the EU, USA, China and Russia, examining the different ways in which governments have tried to strike a regulatory balance between freedom and security, as well as...
... easier to do business.
Third, if single standards and rules are developed, those companies that fail to comply may be held accountable. This is an excellent way to consolidate one’s market standing and undermine competitors.
Steve Crown:
Microsoft Cybersecurity Initiatives
Finally, by calling for government regulations, companies will be able not merely to join the process of drafting rules that suit them, but to take the lead in this, especially since they have the groundwork already laid out....
... project, while partly supporting the idea. Third, suspicious international reactions are detrimental to the country’s image.
Pavel Sharikov:
Protecting Sensitive Data: The Experience of Russia and the US
3. Juggling various interests
Following the Cybersecurity law of 2017, China introduced the non-binding national standard Personal Information Security Specification that is somewhat similar to GDPR. The main focus of the document, however, lies in ensuring national security while still making ...
On April 22–25, 2019, the 13th International Forum on the Problems of International Information Security was held in Garmisch-Partenkirchen (Germany).
On April 22–25, 2019, the 13th International Forum on the Problems of International Information Security was held in Garmisch-Partenkirchen (Germany).
The forum was organized by the National Association for International Information Security (NAIIS) with the International Affairs Journal and gathered over 100 experts from 18 countries (the USA, the...
... country’s officials refrain from speaking openly on the subject. However, on the doctrinal level, the wording tends to be either based on strict principle or very careful. The clearest example of this is a lengthy discussion on information security vs. cybersecurity and the differences in approaches.
What’s more, when looking at various public statements on a subject, one should draw a clear distinction between those made by politicians and those made by technical experts and diplomats at international ...
Foreign viewpoints
After the reelection of Vladimir Putin for another term as president of the Russian Federation in March of this year, Russia is entering a new cycle of foreign and domestic policy. Russia's foreign policy at the moment is particularly fraught; the conflict in Syria, the continued uncertain status of the Donbass region of Ukraine, accusations of cyberwarfare and interference in US elections, and the Skripal poisoning incident in the UK have driven wedges between Russia and many...
... agreement
was signed
between the NATO Computer Incident Response Capability (NCIRC) and the Computer Emergency Response Team of the European Union (CERT-EU). The agreement provides for exchanging technical information between these two bodies, which is intended ... ... virtually any country can become a superpower in cyberspace.
REUTERS/Christian Hartmann
Dmitry Konukhov:
Vaccinated Atom: Cybersecurity
for Nuclear Plants
NATO’s current policies in cyberspace
are based
on defence and deterrence. The Alliance’s ...